Abstract
This paper considers integrity issues that arise because of the relative autonomous nature of sites in a federated database. Such autonomy requires guarantees from the provider of a service and enforcement of such guarantees. Guarantees are expressed as integrity constraints.
Federated databases can form the basis of many forms of automated interorganisational processes. Successful automation of such processes depends on conformance to expectations of all organisations involved. Although mechanisms (such as contract law) exist to ensure compliance, the existing mechanisms are too complex to automate and also too lengthy for many time-critical processes or transactions.
The paper describes an approach where a service provider provides a guarantee, an analysis site simplifies the checking of such constraints and a certification site certifies that guarantees will be enforced.
Chapter PDF
Similar content being viewed by others
Keywords
Keyword codes
References
Abrams, M.D., Amoroso, E.G., LaPadula, L.J., Lunt, T.F. and Williams, J.G. (1993) Report of an Integrity Research Study Group. Computers 6 Security, 12, 679–89.
Bertino, E., Bettini, C., Ferrari, E. and Samarati, P. (1996) A Decentralized Temporal Authorization Model, in Information Systems Security—Facing the Information Society of the 21st Century (eds. S.K. Katsikas and D Gritzalis) Chapman & Hall, London, 271–80.
Ceri, S. and Widom, J. (1993) Managing Semantic Heterogeneity with Production Rules and Persistent Queues. Proceedings of the 19th VLDB Conference, Dublin, Ireland, 108–19.
Chawathe, S.S., Garcia-Molina, H. and Widom, J. (1993) Constraint Management in Loosely Coupled Distributed Databases. Technical report, Computer Science Department, Stanford University.
Chawathe, S.S., Garcia-Molina, H. and Widom, J. (1996) A Toolkit for Constraint Management in Heterogeneous Information Systems, in Proceedings of the Twelfth International Conference on Data Engineering (ed. S.Y.W. Su) IEEE Computer Society, Los Alamitos, CA, 56–65.
Date, C.J. (1983) An Introduction to Database Systems, Volume II. Addison-Wesley, Reading, Massachusetts.
Dayal, U., Hanson, E. and Widom, J. (1995) Active Database Systems, in Modern Database Systems: The Object Model, Interoperability and Beyond (ed. W. Kim) ACM Press, New York, New York, 434–56.
Eswaran, K.P., Gray, J.N., Lorie, R.A. and Traiger, I.L. (1976) The Notions of Consistency and Predicate Locks in a Database System. Communications of the ACM, 19, 11, 624–33.
Fernandez, E.B., Summers, R.C. and Wood, C. (1981) Database Security and Integrity. Addison-Wesley, Reading, Massachusetts.
Grefen, P. and Widom, J. (1996) Integrity Constraint Checking for Federated Databases. Proceedings of the First IFCIS International Conference on Cooperative Information Systems, Brussels, Belgium, 38–47.
Hailpern, B. and Ossher, H. (1990) Extending Objects to Support Multiple Interfaces and Access Control. IEEE transactions on Software Engineering, 16, 11, 1247–57.
Kappe, F. and Maurer, H. (1994) From Hypertext to Active Communication/Information Systems. Journal of Microcomputer Applications, 17, 333–44.
Kim, W., ed. (1995) Modern Database Systems: The Object Model, Interoperability and Beyond. ACM Press, New York, New York.
Lunt, T.F. (1995) Authorization in Object-Oriented Databases, in Modern Database Systems: The Object Model, Interoperability and Beyond (ed. W. Kim) ACM Press, New York, New York, 130–45.
Olivier, M.S. and Von Solms, S.H. (1994) A Taxonomy for Secure Object-oriented Databases. ACM Transactions on Database Systems, 19, 1, 3–46.
Olivier, M.S. (1995) Self-protecting Objects in a Secure Federated Database. Ninth IFIP WG 11. 3 Conference on Database Security, Rensselaerville, New York.
Olivier, M.S. (1996) Self-protecting Objects in Multipolicy Federated Databases: A Prototype. In preparation.
Özsu, M.T. and Valduriez, P. (1991) Principles of Distributed Database Systems. Prentice-Hall, Englewood Cliffs, New Jersey.
Rabitti, F., Bertino, E., Kim, W. and Woelk, D. (1991) A Model of Authorization for Next-Generation Database Systems. ACM Transactions on Database Systems, 16, 1, 88–131.
Rusinkiewicz, M., Sheth, A. and Karabatis, G. (1991) Specifying Interdatabase Dependencies in a Multidatabase Environment. IEEE Computer, 24, 12, 46–53.
Sandhu, R. and Jajodia, S. (1991) Integrity Principles and Mechanisms in Database Management Systems. Computers éa Security, 10, 413–27.
Sandhu, R. and Jajodia, S. (1995) Integrity Mechanisms is Database Management Systems, in Information Security: An Integrated Collection of Essays, (eds. M.D. Abrams, S. Jajodia and H.J. Podell ). IEEE Computer Society, Washington, DC.
Sheth, A.P. and Larson, J.A. (1990) Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases. ACM Computing Surveys, 22, 3, 183–236.
Shilling, J.J. and Sweeney, P.F. (1989) Three Steps to Views: Extending the Object-Oriented Paradigm. Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, ACM, 353–61.
Thuraisingham, B. (1994) Security issues for federated database systems. Computers &Security, 13, 509–25.
Woelk, D., Bohrer, B., Jacobs, N., Ong, K., Tomlinson, C. and Unnikrishnan, C. (1995) Carnot and InfoSleuth: Database Technology and the World Wide Web. Sigmod Record, 24, 2, 443–44.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1997 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Olivier, M.S. (1997). Integrity Constraints in Federated Databases. In: Samarati, P., Sandhu, R.S. (eds) Database Security. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35167-4_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-35167-4_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2900-8
Online ISBN: 978-0-387-35167-4
eBook Packages: Springer Book Archive